PT-2026-2482 · Go+2 · Go+2
Ryotak
·
Published
2025-01-01
·
Updated
2026-04-23
·
CVE-2025-61731
CVSS v3.1
7.8
High
| Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
cmd/go (affected versions not specified)
Description
A malicious file created using cmd/go can result in a write operation to a file controlled by an attacker, with partial control over the file's content. The issue stems from the use of the '#cgo pkg-config:' directive within Go source files. This directive allows command-line arguments to be passed to the Go pkg-config command. An attacker can exploit this by providing a '--log-file' argument, which causes pkg-config to write output to a location specified by the attacker.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Go
Red Os
Rocky Linux